Sciweavers

2006 search results - page 52 / 402
» Heuristic Security-Testing Methods
Sort
View
BIODATAMINING
2008
96views more  BIODATAMINING 2008»
15 years 20 days ago
Fast approximate hierarchical clustering using similarity heuristics
Background: Agglomerative hierarchical clustering (AHC) is a common unsupervised data analysis technique used in several biological applications. Standard AHC methods require that...
Meelis Kull, Jaak Vilo
98
Voted
ACSAC
2010
IEEE
14 years 10 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
95
Voted
ECAI
2004
Springer
15 years 6 months ago
Local Search for Heuristic Guidance in Tree Search
Recent work has shown the promise in using local-search “probes” as a basis for directing a backtracking-based refinement search. In this approach, the decision about the next...
Alexander Nareyek, Stephen F. Smith, Christian M. ...
117
Voted
ECMDAFA
2010
Springer
228views Hardware» more  ECMDAFA 2010»
15 years 3 months ago
Example-Based Sequence Diagrams to Colored Petri Nets Transformation Using Heuristic Search
Dynamic UML models like sequence diagrams (SD) lack sufficient formal semantics, making it difficult to build automated tools for their analysis, simulation and validation. A commo...
Marouane Kessentini, Arbi Bouchoucha, Houari A. Sa...
136
Voted
TSMC
2008
133views more  TSMC 2008»
15 years 12 days ago
Trading With a Stock Chart Heuristic
Abstract--The efficient market hypothesis (EMH) is a cornerstone of financial economics. The EMH asserts that security prices fully reflect all available information and that the s...
William Leigh, Cheryl J. Frohlich, Steven Hornik, ...